Almost two thirds (63%) of Americans say it is annoying to hear ringing cell phones or cell phone chatter in public places. Ringing of cell phones is a.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

TSpaces Services Suite: Automating the Development and Management of Web Services Presenter: Kevin McCurley IBM Almaden Research Center Contact: Marcus.
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
Fraunhofer FOKUS Context Management in Dynamic Environments IWCMC 2009, June 2009 Jens Tiemann Humberto Astudillo Evgenij Belikov Fraunhofer Institute.
ARCH-05 Application Prophecy UML 101 Peter Varhol Principal Product Manager.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
6/1/2015Ch.31 Defining Enterprise Architecture Bina Ramamurthy.
Service Oriented Architectures in Heterogeneous Environments
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB JavaForum.
© 2005 Prentice Hall7-1 Stumpf and Teague Object-Oriented Systems Analysis and Design with UML.
Situation Aware Mobile Computing (SAMC) CPSC 608 Project Spring 2002 Project Members: Brent Dinkle Hemant Mahawar Marco Morales Sreekanth R. Sambavaram.
Think. Learn. Succeed. Aura: An Architectural Framework for User Mobility in Ubiquitous Computing Environments Presented by: Ashirvad Naik April 20, 2010.
© 2009 Research In Motion Limited Methods of application development for mobile devices.
Title put our names here. General Problem Statement Ability to give customized information to a user based on the user’s current location, the current.
7.1 © 2007 by Prentice Hall 7 Chapter Telecommunications, the Internet, and Wireless Technology.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
SensIT PI Meeting, April 17-20, Distributed Services for Self-Organizing Sensor Networks Alvin S. Lim Computer Science and Software Engineering.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Chapter 22 Object-Oriented Design
Maintaining and Updating Windows Server 2008
Cloud Usability Framework
Operating Systems.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
Chapter 10: Authentication Guide to Computer Network Security.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Indoor Localization using Wireless LAN infrastructure Location Based Services Supervised by Prof. Dr. Amal Elnahas Presented by Ahmed Ali Sabbour.
Configuration Management T3 Webinar Feb 21, 2008 Chuck Larsen ITS Program Coordinator Oregon Department of Transportation.
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
November, 2006Doc: IEEE BAN Young Hyeog Jeon, et al Slide1 Useful applications for IG-BAN Young Hyeog Jeon, Eunkyo Kim and Donghee Shim.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 1 MIS 320 Kraig Pencil Summer 2014.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Chapter 14 Part II: Architectural Adaptation BY: AARON MCKAY.
Intro to Network Design
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Lesson Overview 3.1 Components of the DBMS 3.1 Components of the DBMS 3.2 Components of The Database Application 3.2 Components of The Database Application.
OPERETTA: An Optimal Energy Efficient Bandwidth Aggregation System Karim Habak†, Khaled A. Harras‡, and Moustafa Youssef† †Egypt-Japan University of Sc.
D. Buchs, A. Chen, D. Hurzeler, L. Lúcio, L. Pedro, M. Risoldi Software Modeling and Verification group Applications Discovered = Appear Save or Discard.
Capturing the requirements  Requirement: a feature of the system or a description of something the system is capable of doing in order to fulfill the.
Design Patterns -- Omkar. Introduction  When do we use design patterns  Uses of design patterns  Classification of design patterns  Creational design.
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
TIU Tracking System Introduction Intel's large and complex validation labs contain many Test Interface Units (TIUs) used in validating hardware. A TIU.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
Creating SmartArt 1.Create a slide and select Insert > SmartArt. 2.Choose a SmartArt design and type your text. (Choose any format to start. You can change.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Unit 1—Computer Basics Lesson 1 Understanding Computers and Computer Literacy.
TIU Tracking System Requirements Asset tag’s size: 1” x 1” x 1” Low power consumption Accurate Web application as user interface 2D map display Scalable.
Component Patterns – Architecture and Applications with EJB copyright © 2001, MATHEMA AG Component Patterns Architecture and Applications with EJB Markus.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
TIU Tracking System Introduction Intel's large and complex validation labs contain many Testing Interface Unit's(TIU) used in validating hardware. A TIU.
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Third International Workshop on Networked Appliance 2001 SONA: Applying Mobile Agent to Networked Appliance Control S.Aoki, S.Makino, T.Okoshi J.Nakazawa.
Achieving All the Time, Everywhere Access in Next- Generation Mobile Networks by Marcello Cinque, Domenico Cotroneo and Stefano Russo Presented by Ashok.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
Efficient Opportunistic Sensing using Mobile Collaborative Platform MOSDEN.
Maintaining and Updating Windows Server 2008 Lesson 8.
Data Grids, Digital Libraries and Persistent Archives: An Integrated Approach to Publishing, Sharing and Archiving Data. Written By: R. Moore, A. Rajasekar,
Chapter 18 MobileApp Design
Process Capability.
Network Architecture By Dr. Shadi Masadeh 1.
Presentation transcript:

Almost two thirds (63%) of Americans say it is annoying to hear ringing cell phones or cell phone chatter in public places. Ringing of cell phones is a big complaint and many times a cause of embarrassment in classrooms and meeting rooms How about making the environment smart so that it takes care of silencing the cell phones even if the users forget! Will save some embarrassment for sure, isn’t it?

Infrastructure for Context Driven Pervasive Computing Applications Presented by: Vishakha Gupta Advisor: Prof. Peter Steenkiste Reader: Prof. Raj Rajkumar

Information Networking Institute 3 Agenda  Goals  Scenarios  Requirements  Concept  Thesis Statement  Motivation  Related Work  Architecture  Evaluation  History Information  Conclusion  Limitations  Future Work

Information Networking Institute 4 Goals  In usual applications and services user has to initiate some action in order to use the results  Smart environment for a better user experience  Focus on area based user tracking in in-building environments  Less attention has been paid to the fundamental and challenging problem of providing capability to an application in defining physical areas − Determine with high probability when the user is in the area of interest to the application

Information Networking Institute 5 Scenarios  When a person enters a secure building, devices monitor his motion and warn him if he goes in a prohibited area, through a warning message passed to his cell phone  In an auditorium, where a show or some program is going to begin, everyone’s cell phone is expected to be turned off or to be in silent mode  When people are seated in the airplane, as the plane is about to take off, the cell phones and other electronic devices (if possible) could receive an interrupt indicating they should turn themselves off.  At places such as a meeting hall, a classroom, a hospital, cell phone rings may cause disturbance. At the same time, people may want to attend their calls. So the devices should be signaled to change over to the silent mode

Information Networking Institute 6 Requirements  A method to define the regions of interest to the application  An infrastructure to enable area based tracking for the client devices in an establishment  Need for downloading of software on a handheld or including the APIs necessary for communication in the handheld by the device manufacturers  Authenticity of the code getting downloaded and the source of the messages  No effect on the normal communication or device use  Interoperability and other challenges associated with a distributed system  Generic APIs to help accommodate new applications that are developed

Information Networking Institute 7 Concept

Information Networking Institute 8 Thesis Statement  Present an infrastructure for context-driven applications enabling them to specify area-based user tracking requirements  Ability to determine with high probability when the user is in the area of interest to the application

Information Networking Institute 9 Motivation  Minimal change in the infrastructure.  Easy testing and deployment  No requirement to formulate a coordinate system  Flexibility to an application in defining the attributes of an area as needed  No restriction in terms of the shape of an area to be defined by the application

Information Networking Institute 10 Related Work  Area aware computing - relatively new concept  Research work that comes really close to the concept presented in this thesis − Area based triggers by Hermann et. Al. − Fingerprinting using access points as in PlaceLab project by Intel

Information Networking Institute 11 Related Work [2]  Other related projects − RADAR project for in-building user tracking by Microsoft Research − AURA hybrid space model by CMU − CRICKET project by MIT

Information Networking Institute 12 Terminology  Zone – A physical area defined by an application for its use. For example, the area where cell phones must be turned to silent mode like in an auditorium  Region – Any area in a building which could be a zone  Signature – Tuple consisting of used by the application to define zones in WiFi signal space  Client Signature - Tuple consisting of read by a client device from its wireless interface  Region Definition or Rule – A tuple of the form used in defining zones

Information Networking Institute 13 Terminology [2]  Location – A tuple of the form defined keeping in mind a requirement of having actual Euclidean coordinates if needed anytime by the system. Currently we use the description member to make the location more meaningful wherever it is used.  Percentage Match – It’s the probability with which the client signature matches a zone definition using the algorithms described later  Message – It’s a string used as an attribute for the zone, defined by the application if it wants to convey something to the user when he is mapped to a certain zone  Action – The action that the application expects users to perform when they are in a certain zone

Information Networking Institute 14 Architecture

Information Networking Institute 15 Architecture – Offline Zone Definition  Repository − Stores access point, zone and rule information  Repository Manager − Interface for application to provide requisite information

Information Networking Institute 16 Architecture – Offline Zone Definition [2]

Information Networking Institute 17 Architecture – Server  Listener – Listens for client requests consisting of client signature  Rule Manager – − Uses rule and zone information from the Repository − Uses algorithm to find a matching zone for the current client signature  Sender – Sends the zone information to client with message and action

Information Networking Institute 18 Architecture – Client  Wireless Device Reader – reads wireless card information and forms client signature  Sender – sends client signature to the server for zone matching  Listener – receives zone information from server  UI Component – interacts with the user if required by the application

Information Networking Institute 19 Algorithms begin procedure find-match Let A be the best heard access point by the client Let L denote the client signature Let M denote the list of zones with signatures consisting of A loop for all the zones Z in M store best zone(s) found end loop return best heard zone(s) end procedure find-percent-match(Z, L)

Information Networking Institute 20 Algorithms – Exact Match begin procedure find-percent-match count = number of access points in signature S used in definition of Z loop for all access points B used in S if (B exists in L and RSSI heard for it is within RSSI_MIN A and RSSI_MAX A ) increment match end loop percent = match /count * 100 return percent end procedure

Information Networking Institute 21 Algorithms – Deviated Match begin procedure find-percent-match count = number of access points in signature S used in definition of Z drop_per_deviation = 0.2 loop for all access points B used in S if (B exists in L and RSSI heard for it is within RSSI_MIN A and RSSI_MAX A ) increment match else dMatch = (1 – (deviation in RSSI from MIN or MAX) * drop_per_deviation) if dMatch > 0 then match += dMatch end loop percent = match /count * 100 return percent end procedure

Information Networking Institute 22 Algorithms – Weighted Match begin procedure find-percent-match count = number of access points in signature S used in definition of Z loop for all access points B used in S if (B exists in L and RSSI heard for it is within RSSI_MIN A and RSSI_MAX A ) match += Weight A end loop percent = match /count * 100 return percent end procedure

Information Networking Institute 23 Algorithms – Weighted Deviation Match begin procedure find-percent-match loop for all access points B used in S if (B exists in L and RSSI heard for it is within RSSI_MIN A and RSSI_MAX A ) match += WeightA else dMatch = (1 – (deviation in RSSI) * drop_per_deviation) if dMatch > 0 then match += (dMatch * Weight A ) else if (dMatch < 0) then dMatch = exp (-Weight A * deviation in RSSI / 100); match *= dMatch end loop percent = match /count * 100 return percent end procedure

Information Networking Institute 24 Evaluation – Define Zones

Information Networking Institute 25 Evaluation – RSSI Measurement

Information Networking Institute 26 Evaluation – Entering Information  Room 105 (Area: 44.6 sq.m) – can be defined as − ; ; ;  Reception (Area: sq.m) – can be defined as − ; ; ;  Room 127 (Area: 8.18 sq.m) – can be defined as − ; ; ;

Information Networking Institute 27 Evaluation – Comparison of Algorithms

Information Networking Institute 28 Evaluation – Comparison of Algorithms [2]

Information Networking Institute 29 Evaluation – Comparison of Algorithms [3]

Information Networking Institute 30 Evaluation - Conclusion  Deviated Match algorithm better than remaining with number of access points(N) > 3  The number of access points determined by the zone under consideration  The Weighted Deviation Match algorithm shows more consistency in accuracy − Reduces spurious results acquired due to the exponential degradation − Example on next slide

Information Networking Institute 31 Evaluation – Conclusion [2]  At one point, Room 105 matched at Position 1 by Exact Match, Deviation Match and Weighted Match  The Weighted Deviation Match algorithm showed Room 127 Client signature at 1 – ; ; Zone definition for Room 127 – ; ; ; Zone definition for Room 105 – ; ; ;

Information Networking Institute 32 Evaluation - Limitations  Only defined zone is Reception  But Rooms 101, 103 and Lobby also show a match for Reception using any of the four algorithms presented

Information Networking Institute 33 Evaluation – Limitations [2]  Only defined zone is Room 127  But the shaded portion on the floor plan also shows a match for Room 127 using any of the four algorithms presented

Information Networking Institute 34 History Information  Use past area information to conclude strongly about the present position  Use bluetooth devices to conclude strongly about the present position  New term “Space” - An area that is not defined by the application but which could be of consequence in defining zones − E.g. A corridor in the building which might be leading to a zone  Clients modified to report any nearby bluetooth devices as well as the previous area matched with a timestamp

Information Networking Institute 35 History – Using Space Information  Consider two applications − One has defined Zone Y − The other has defined Zone Z  At time t, the system knows that a device is in Space X (maybe by using one of the signature matching algorithms mentioned earlier)  At time t + 1, the client signature says Space X with timestamp t − Higher probability that user must be in Zone Y for application 1 while in Zone Z for application 2 − Example follows

Information Networking Institute 36 History – Using Space Information [2]

Information Networking Institute 37 History - Bluetooth

Information Networking Institute 38 History – New Algorithm begin procedure find-percent-match Let bDevice represent a bluetooth device if timestamp of client signature and server do not differ by MARGIN if bDevice heard by client and bDevice identifies Z return complete match if Space S heard by client before this iteration and S leads to Z perform signature based match percent = (weight1 * space match percent + weight2 * signature match percent) / 2 return percent perform match as in previous signature based cases return percent match end procedure

Information Networking Institute 39 Conclusions  Solution for area aware computing using existing infrastructure  Implemented and analyzed four algorithms for WiFi signal space matching of zones − Weighted Deviation Match algorithm works best in general  Improvement in identifying zones using history information

Information Networking Institute 40 Limitations  Zone definitions in WiFi signal space − Configuration of access points − Performance at different times of day − Varying signal strength  Bluetooth − Chances of having Bluetooth devices installed

Information Networking Institute 41 Future Work  Experimental evaluation of history information  Study the scalability of the system by introducing multiple clients − Account for network usage and computation requirements on the client  Implement an end to end system involving − Download and verification of software on multiple devices  Study the variation pattern in RSSI to define a model − Define a variable signature depending on time of day etc. constituting an intelligent zone definition

Information Networking Institute 42

Information Networking Institute 43 Thank You

Information Networking Institute 44 Implementation - Server

Information Networking Institute 45 Implementation - Client